did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072125009

MCSE Windows 2000 Accelerated Study Guide : Exam 70-240

by ;
  • ISBN13:

    9780072125009

  • ISBN10:

    0072125004

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2000-09-01
  • Publisher: McGraw-Hill Osborne Media
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99
We're Sorry.
No Options Available at This Time.

Summary

Provides detailed coverage of all the technical objectives require to pass the Microsoft approved 2000 exam for current NT 4.0 MCSEs. Network Professionals learn installing, configuring, and troubleshooting techniques. Increased annotated visual screen shots, line art illustrates critical study points, photographs describe complex points. CD-ROM contains tons of video clips for easier learning, self-paced Skill Builder Software with more than 300 knowledge and scenario-based TEST YOURSELF Personal Testing Center questions, simulation exam that completely look and feel like the real exam.

Table of Contents

Foreword v
About the Contributors ix
Acknowledgments xvii
Preface xxxix
Introduction xliii
Part I Active Directory 1(288)
Installing the Active Directory
3(56)
Installing Active Directory
4(19)
Data Collation
5(1)
Prerequisites
6(2)
DCPROMO
8(9)
Verifying Successful Installation
17(2)
Installing and Uninstalling Active Directory
19(4)
Creating Sites
23(4)
What Is a Site?
23(1)
How to Create a Site
24(2)
Creating New Sites in the Active Directory
26(1)
Creating Subnets
27(4)
What Is a Subnet?
27(1)
How to Create a Subnet
28(2)
Creating Subnets in Active Directory
30(1)
Creating Site Links
31(4)
What Is a Site Link?
31(1)
How to Create a Site Link
31(3)
Creating Site Links in Active Directory
34(1)
Assigning Bridgehead Servers
35(3)
What Is a Bridgehead Server?
35(1)
How to Create a Bridgehead Server
36(1)
Designating a Server as a Bridgehead Server
37(1)
Creating Site Link Bridges
38(8)
What Is a Site Link Bridge?
38(2)
How to Create a Site Link Bridge
40(5)
Creating Site Link Bridges in Active Directory
45(1)
Create Connection Objects
46(4)
What Are Connection Objects?
46(1)
How to Create Connection Objects
46(3)
Creating Connection Objects for Active Directory Domain Controllers
49(1)
Creating Global Catalog Servers
50(9)
What Is a Global Catalog Server?
51(1)
How to Create a Global Catalog Server
51(1)
Defining Global Catalog Servers in Active Directory
52(3)
Two-Minute Drill
55(4)
Active Directory Configuration
59(42)
Verifying Active Directory Installation
60(6)
Varifying the Domain Controller
61(1)
Verifying the Domain from My Network Places
62(1)
Verifying the Domain Controller from Active Directory Users and Computers
63(1)
Verifying the DNS Server
64(1)
Verifying the DNS Server
64(2)
Moving Server Objects Between Sites
66(8)
Creating a Server Object in a Site
67(2)
When to Move Objects
69(1)
How to Move Objects
70(1)
Moving Server Objects from One Site to Another
70(2)
Removing a Server Object from a Site
72(2)
Transferring Operations Master Roles
74(14)
What Are the Operations Master Roles?
74(3)
When to Transfer Roles, and Why
77(1)
How to Transfer Roles
78(1)
Transferring the Schema Master Role
78(3)
Identifying the Present Assignment of Roles
81(3)
Transferring Domainwide Assignment of Operations Master Roles
84(4)
Implementing an Organizational Unit Structure
88(13)
OU Design Overview
88(2)
Creating the OU Structure
90(1)
Creating an Organizational Unit
91(3)
Creating an Object
94(5)
Two-Minute Drill
99(2)
Planning an Active Directory Implementation
101(28)
Establishing the Scope of Active Directory
102(6)
AD as your central Employee Database
102(1)
Replicating with Existing Databases Using AD
103(2)
The Active Directory Connector and Exchange 5.5
105(2)
When Should You Extend Your Schema?
107(1)
Designing the Namespace
108(5)
Deciding on Your Domain Names
112(1)
Planning the DNS Strategy
113(5)
Integrated DNS
114(1)
Stand-alone DNS
114(1)
Planning Your DNS Strategy
115(1)
Working with Non-Windows 2000 DNS Servers
116(2)
Separate External DNS Servers
118(1)
Naming Conventions
118(11)
Forest Name
119(1)
Domain Names
120(2)
OUs
122(2)
Defining Object Naming Standards in Windows 2000
124(3)
Two-Minute Drill
127(2)
Planning an Active Directory Replication
129(38)
Managing and Troubleshooting Active Directory Replication
130(25)
What Is Active Directory Replication?
131(4)
How Domain Controllers Track Changes
135(4)
Network and Knowledge Consistency Checker Topology
139(1)
Overview of Sites, Subnets, Links, and Replication
140(5)
Managing Intrasite Replication
145(1)
Managing Intersite Replication
146(4)
Troubleshooting Active Directory Replication
150(2)
Using the Active Directory Replication Monitor
152(3)
Managing and Troubleshooting Domain Name System Replication
155(12)
Windows 2000 DNS Features
156(5)
Troubleshooting Domain Name System Replication
161(1)
Creating Primary and Secondary DNS Zones
162(3)
Two-Minute Drill
165(2)
Active Directory Security Solutions
167(34)
Configuring and Troubleshooting Security in a Directory Services Infrastructure
168(21)
Applying Security Policies Using Group Policy
168(3)
Creating a New Group Policy Object
171(2)
Exercise 5-2: Using Group Policy Editor to Change Security Settings
173(2)
Security Configuration and Analysis
175(6)
Setting Security on a File System
181(1)
Implementing an Audit Policy
182(3)
Setting Up Audit Policies on a Stand-Alone Computer
185(2)
Auditing Access to Files and Folders
187(2)
Monitoring and Analyzing Security Events
189(12)
Events to Monitor
189(4)
Configuring a Security Log
193(3)
Interpreting Security Events
196(3)
Two-Minute Drill
199(2)
Optimizing Active Directory Components
201(56)
Managing Active Directory Objects
202(37)
Moving Active Directory Objects
203(2)
Moving User Accounts Within a Domain
205(4)
Moving an Organizational Unit from One Domain to Another
209(2)
Publishing Resources in Active Directory
211(2)
Publishing a Shared Folder in Active Directory
213(2)
Publishing a Non-Windows Printer in Active Directory
215(1)
Locating Objects in Active Directory
216(1)
Viewing Published Network Services in Active Directory
217(3)
Searching for a Shared Folder in Active Directory
220(1)
Creating and Managing Accounts Manually or by Scripting
221(1)
Creating User Accounts in a Domain
222(5)
Controlling Access to Active Directory Objects
227(3)
Setting Permissions on Active Directory Objects
230(2)
Delegating Administrative Control of Objects in Active Directory
232(2)
Delegating Control of Active Directory Objects
234(5)
Managing Active Directory Performance
239(18)
Monitoring, Maintaining, and Troubleshooting Domain Controller Performance
239(4)
Monitoring Active Directory Performance
243(3)
Monitoring, Maintaining, and Troubleshooting Active Directory Components
246(4)
Adding a New Schema Attribute
250(2)
Adding a New Schema Class
252(3)
Two-Minute Drill
255(2)
Monitoring and Troubleshooting Active Directory
257(32)
Backing Up and Restoring Active Directory
258(31)
Components and Files that Make Up AD
258(5)
Backing Up Active Directory Components
263(12)
Restoring Active Directory Components
275(1)
Backing Up Active Directory
275(1)
Performing a Restore of Active Directory
276(8)
Recovering from a System Failure
284(3)
Two-Minute Drill
287(2)
Part II Change and Configuration Managements 289(140)
Managing a Windows 2000 Network with Group Policy
291(42)
Creating a Group Policy Object
292(6)
What Are GPOs?
292(2)
Deciding Where to Apply a Group Policy Object in the Organizational Unit Structure
294(1)
How to Create the Policy
294(3)
Creating a Group Policy Object
297(1)
Linking an Existing Group Policy Object
298(4)
An Overview of Group Policy Object Location in Active Directory
298(1)
How to Link a Group Policy Object, and Why
299(2)
Linking a Group Policy Object
301(1)
Delegating Administrative Control of Group Policy
302(5)
Why Delegate Control?
302(1)
How to Delegate Control of Group Policy Objects
302(4)
Delegating Control of a Group Policy Object
306(1)
Modifying Group Policy Inheritance
307(4)
What Is Inheritance?
307(1)
Managing Inheritance
308(1)
How to Change the Group Policy Object Inheritance
309(1)
Modifying Group Policy Inheritance
310(1)
Filtering Group Policy Settings
311(6)
Why Filter a Group Policy Object?
311(1)
How to Apply a Filter to a Group Policy Object
312(4)
Filtering Group Policy Using Security Groups
316(1)
Modifying Group Policy
317(4)
Changing the Policy
318(2)
Deleting a Group Policy
320(1)
Controlling User Environments Using Administrative Templates
321(4)
What Can the Administrator Control?
322(1)
How to Create and Import Templates
322(2)
Controlling Environments with Administrative Templates
324(1)
Assigning Script Policies to Users and Computers
325(8)
User vs. Computer Scripts
326(3)
Assigning Script Policies
329(2)
Two-Minute Drill
331(2)
Managing the Windows 2000 Application Environment
333(40)
Deploying Software Using Group Policy
334(9)
Windows Installer and MSI Files
335(1)
Creating an MSI Package Using WinINSTALL LE
336(4)
When to Use GPOs to Deploy Software, and Why
340(1)
Applying the Package to an Organizational Unit
340(3)
Maintaining Software Using Group Policy
343(6)
Software Upgrades
344(2)
Deploying a Software Upgrade
346(1)
Redeploying Software
347(1)
Removing Software
348(1)
Configuring Deployment Options
349(8)
Filtering the Package
350(1)
Miscellaneous Deployment Options
351(3)
Changing Categories
354(2)
Categorizing Packages
356(1)
Using Transforms
357(1)
Troubleshooting During Software Deployment
357(3)
Common Deployment Problems
357(2)
Event Viewer
359(1)
Managing Network Configuration Using Group Policy
360(13)
Configuring Internet Explorer
360(3)
Other Configurable Options
363(7)
Two-Minute Drill
370(3)
Remote Installation Services
373(56)
What is Remote Installation Service?
374(6)
PXE and Supported Hardware
375(1)
Installing RBFG.EXE and Checking Network Card Compatibility
376(1)
How RIS Works
377(1)
RIS Components
378(2)
Creating a RIS Server
380(2)
Prerequisites
380(1)
Installing RIS
381(1)
Installing RIS
381(1)
Authorizing a RIS Server
382(3)
Why Authorize a RIS Server?
383(1)
The Authorization Process
383(1)
Authorizing a RIS Server
384(1)
Configuring a RIS Server
385(11)
Types of Images
385(1)
RISetup and CD-Based Images
385(2)
Running RISetup
387(5)
Computer Account Creation
392(4)
Troubleshooting RIS
396(2)
Common Errors
396(1)
The Troubleshooter
397(1)
Accessing the RIS Troubleshooter
397(1)
Preparing to Use RIS to Install the Client Machine
398(6)
Supported Hardware
400(1)
Unsupported Hardware
401(1)
Group Policy Settings
401(1)
Restricting Client Installation Options
402(2)
Installing an Image to a Client Machine
404(13)
Creating the RIS Boot Disk
405(1)
Creating a Remote Installation Boot Disk
406(1)
Installation Scenarios
407(6)
Installation Options
413(4)
Troubleshooting the Use of RIS to Install the Client Machine
417(12)
Network Errors
417(4)
Hardware Issues
421(6)
Two-Minute Drill
427(2)
Part III Installing Windows 2000 429(138)
Windows 2000 Attended Installation
431(40)
Performing an Attended Installation of Windows 2000
432(39)
Preparing for Installation
433(11)
Windows 2000 Application Compatibility
444(1)
Installing from the Windows 2000 CD-ROM
445(1)
Starting the Installation for Windows 2000
446(4)
Running the Setup Wizard
450(3)
Installing the Networking Components
453(2)
Installing over the Network
455(1)
Completing the Setup Program
455(1)
Network Installation of Windows 2000
456(4)
Upgrading to Windows 2000 Professional
460(3)
Applying Update Packs to Installed Software Applications
463(2)
Troubleshooting Failed Installations
465(4)
Two-Minute Drill
469(2)
Windows 2000 Unattended Installation
471(56)
Disk Duplication Methods
472(11)
Which Duplication Tool to Use, and When
473(1)
Where to Find Sysprep and RIPrep?
473(1)
Sysprep
473(4)
Running Sysprep from the Command Prompt
477(1)
What Is RIPrep?
478(1)
Preparing and Deploying Images Using SysPrep and RIPrep
478(2)
Running the Remote Installation Preparation Wizard
480(3)
The Scripted Method
483(2)
When to Use UNATTEND.TXT Instead of SysPrep or RIPrep
483(2)
Performing an Unattended Installation of Windows 2000 Professional
485(13)
Setting Up a Network Share
485(1)
Using Setup Manager to Automate the Installation Process
486(1)
Creating a Network Share
486(1)
Using Setup Manager to Create Answer Files
487(11)
Understanding the Difference Between Unattended Installations and Prepared Images
498(4)
Creating Answer Files for Unattended Installation
499(1)
Creating a Custom Answer File
499(3)
Understanding the Remote Installation Service (RIS)
502(15)
How Does RIS Work?
502(2)
Installing the Remote Installation Server
504(1)
Installing the Remote Installation Service
505(1)
Configuring the Remote Installation Service
506(2)
Authorizing the RIS Server
508(1)
Restricting Client Installation Options
509(1)
Restricting the Operating System Image Options
510(1)
Hardware Requirements for RIS
511(3)
Creating a Remote Installation Boot Disk
514(1)
Deploying Windows 2000 Using Remote Installation Service
515(2)
Performing an Unattended Installation of Windows 2000 Server
517(10)
WINNT32 or WINNT?
517(2)
Installing Optional Programs
519(1)
Running an Unattended Installation Using the WINNT32.EXE Command
519(1)
Unattended Installation Using a Bootable CD-ROM
520(1)
Running Unattended Installation from a CD-ROM
521(2)
Two-Minute Drill
523(4)
Upgrading to Windows 2000 from Windows NT
527(40)
Planning a Network Upgrade to Windows 2000
528(14)
Networking Requirements
529(1)
Determining the Current TCP/IP Configuration
530(6)
Domain Upgrade Strategy
536(6)
Upgrading a Server from Windows NT
542(17)
Upgrade Paths
543(2)
Minimum Hardware Requirements
545(1)
Rollback Strategy
546(1)
Determining a Strategy and Performing Upgrades of Domain Controllers to Windows 2000
546(3)
Switching from Mixed Mode to Native Mode
549(1)
Upgrade and Promote Member Servers to Windows 2000
550(1)
Upgrading a Member Server to a Domain Controller
551(8)
Deploying Service Packs
559(1)
Testing Service Packs
560(1)
Integrating Service Packs with Distribution Images
560(1)
Troubleshooting Failed Installations
560(7)
Resolving Common Problems
561(1)
Setup Logs
561(1)
Looking at the Setup Logs
562(3)
Two-Minute Drill
565(2)
Part IV Windows 2000 Network Administration 567(200)
Administering Shared Resources
569(62)
Monitoring, Configuring, Troubleshooting, and Controlling Access to Files, Folders, and Shared Folders
570(19)
Local Security on Files and Folders
570(8)
Access to Files and Folders in a Shared Folder
578(2)
Creating a Shared Folder in the Active Directory
580(7)
Troubleshooting Access to Shared Folders
587(2)
Monitoring, Configuring, Troubleshooting, and Controlling Access to Dfs Resources
589(10)
Sharing Folders Using Dfs
590(4)
Creating and Publishing a Dfs Root
594(5)
Monitoring, Configuring, Troubleshooting, and Controlling Access to Printers
599(32)
Windows 2000 Printing Terminology
599(1)
Network Printing Environment
600(4)
Installing and Sharing Printers
604(6)
Installing and Sharing a TCP/IP Network Printer
610(8)
Managing Printers and Print Servers
618(7)
Troubleshooting Printing Problems
625(3)
Two-Minute Drill
628(3)
Terminal Services and Internet Information Services
631(32)
Understanding Terminal Services
633(4)
Remote Administration vs. Application Server
635(1)
Connecting to a Terminal Server with Terminal Services Client
635(1)
Remote Control vs. Remote Access
636(1)
Installing and Configuring Terminal Services
637(8)
Installing in Remote Administration Mode
638(1)
Installing in Application Server Mode
639(3)
Terminal Services Licensing
642(1)
Remotely Administering Servers Using Terminal Services
643(1)
Configuring Terminal Services for Application Sharing
643(1)
Configuring Applications for Use with Terminal Services
644(1)
Monitoring and Troubleshooting Terminal Services
645(6)
Remote Control of a Terminal Services Session
647(2)
Establishing Policies for Terminal Services
649(1)
Terminal Services Environment vs. Local Environment Settings
650(1)
Understanding Internet Information Services
651(12)
Installing Internet Information Services
651(1)
Monitoring, Configuring, and Troubleshooting Access to Web Sites
652(2)
Accessing Files and Folders via Web Services
654(6)
Two-Minute Drill
660(3)
Securing Windows 2000 Resources with Encryption, Policies, and Profiles
663(38)
Encrypting Data on a Hard Disk by Using EFS
664(11)
Encrypt Folders and Files
670(1)
Using EFS to Encrypt Data
671(2)
Decrypt Folders and Files
673(1)
The Cipher Command
673(2)
Implementing, Configuring, Managing, and Troubleshooting Policies in a Windows 2000 Environment
675(17)
Local Policy
675(2)
System Policy
677(1)
Group Policy
677(12)
Modifying a GPO
689(2)
Using Group Policy for Software Distribution
691(1)
Troubleshooting Local and Group Policies
691(1)
Creating and Managing User Profiles
692(9)
How to Create a Customized Roaming User Profile and Copy and Assign It to a User Profile
697(3)
Two-Minute Drill
700(1)
Implementing a Windows 2000 Security Infrastructure
701(28)
Implementing, Configuring, Managing, and Troubleshooting Auditing
702(7)
Configuring Auditing
703(1)
Adding the Group Policy Snap-in and Setting Up Auditing Files and Folders
703(2)
Setting an Audit Policy
705(1)
Auditing Access to Files and Folders
706(1)
Auditing Access to Active Directory Objects
706(1)
Enabling Auditing of the Directory Service Access Event
707(2)
Implementing, Configuring, Managing, and Troubleshooting Local Accounts
709(8)
Creating and Managing User Accounts
710(1)
Adding a New User
710(3)
Creating and Managing Computer Accounts
713(1)
Adding a Computer to the Domain
713(1)
Creating and Managing Local Groups
714(2)
Security Groups
716(1)
Implementing, Configuring, Managing, and Troubleshooting Account Policy
717(4)
Password Policy
717(1)
Changing Password Policies
717(2)
Account Lockout Policy
719(1)
Kerberos V5 and Kerberos Policy
719(2)
Using the Security Configuration Toolset
721(8)
Security Configuration and Analysis Snap-in
721(1)
Setting Up the Personal Database and Analyzing System Security
722(1)
Security Setting Extensions to Group Policy
723(1)
Viewing Local Security Policy
723(1)
Templates
724(1)
The secedit.exe Command Line Tool
725(3)
Two-Minute Drill
728(1)
Windows 2000 Resource Protection and Disaster Recovery
729(38)
Managing and Optimizing Availability of System State Data and User Data
730(17)
Advanced Startup Options
731(4)
Recovery Console
735(1)
Installing Recovery Console
736(1)
Starting Recovery Console from Setup Media
737(3)
Using Group Policy to Enable Set Command
740(3)
Active Directory Data Considerations
743(4)
Backing up and Recovering Systems and User Data
747(20)
Windows Backup
747(1)
Using Windows Backup
748(7)
Backing Up Selected Files and Folders
755(6)
Restoring Active Directory
761(4)
Two-Minute Drill
765(2)
Part V Configuring Windows 2000 767(138)
Hardware and Device Driver Installation and Configuration
769(28)
Configuring Hardware Devices
770(6)
Minimizing Hardware Problems Before They Begin
770(1)
Plug and Play and Non-Plug and Play Installations
771(1)
Troubleshooting Plug and Play Installations
772(1)
Using Hardware Profiles
773(1)
Creating a Hardware Profile
774(2)
Configuring Driver Signing Options
776(3)
Setting Driver-Signing Options
777(1)
Configuring Driver Signing Options
778(1)
Updating Device Drivers
779(8)
Getting Familiar with Device Manager
779(1)
How to Open Device Manager
780(1)
Getting Details about a Device Driver
781(1)
Opening Properties for a Device
781(2)
Device Driver Updating
783(1)
Walk through the Upgrade Device Driver Wizard
784(1)
Removing a Device
785(1)
Walk through the Add/Remove Hardware Wizard
785(1)
Disabling a Device
786(1)
Troubleshooting Problems with Hardware
787(10)
Identifying Problem Devices
788(1)
Checking the Status of a Device
789(2)
Checking the Status of a Device
791(1)
Troubleshooting a Device That Isn't Working Properly
792(3)
Two-Minute Drill
795(2)
Managing Windows 2000 Data Storage
797(30)
Monitoring, Configuring, and Troubleshooting Disks and Volumes
798(16)
Basic Storage
798(5)
Dynamic Storage
803(4)
Upgrading a Basic Disk to Dynamic
807(3)
File Systems
810(1)
The Disk Management Tool
811(1)
Creating a Simple Volume with the Disk Management Tool
812(1)
Management Tool
812(2)
Configuring Data Compression
814(2)
Compressing an NTFS Folder
815(1)
Monitoring and Configuring Disk Quotas
816(5)
Setting, Assigning, and Configuring Disk Quotas
817(1)
Creating Quotas for All Users
817(2)
Create New Quota Entries
819(1)
Disk Quotas and Compression
820(1)
Recovering from Disk Failures
821(6)
Implementing Fault-Tolerant Volumes
821(1)
Recovering a Failed Mirrored Volume
821(1)
Adding a Mirror to an Existing Volume
822(1)
Recovering a Failed RAID-5 Volume
823(2)
Two-Minute Drill
825(2)
Configuring the Desktop Environment
827(44)
Configuring and Managing User Profiles
828(20)
Adding a User Profile
832(1)
Adding a User Using Local Users Manager
832(5)
Configuring a User Profile
837(1)
Adding a User to a Group Using Local Users Manager
837(4)
Removing a User from a Group
841(1)
Advanced User Profile Configuration
842(2)
Set Up a Roaming Profile
844(4)
Configuring and Troubleshooting Desktop Settings
848(11)
Getting to Group Policy
848(1)
Creating a Group Policy Icon
849(3)
Setting Policy
852(2)
Desktop Environment Settings
854(5)
Configuring and Troubleshooting Accessibility Services
859(12)
Keyboard Options
859(2)
Turning on StickyKeys
861(1)
Sound Options
862(1)
Display Options
862(3)
Mouse Options
865(1)
On-Screen Keyboard
865(3)
Two-Minute Drill
868(3)
Optimizing Windows 2000
871(34)
Monitoring and Optimizing Usage of System Resources
872(13)
Using System Monitor
872(5)
Using System Monitor
877(3)
Bottlenecks
880(5)
Managing Processes
885(6)
Setting and Configuring Priorities and Starting and Stopping Processes
886(2)
Using Task Manager to Manage Processes
888(2)
Using the START Command to Set a Process's Priority
890(1)
Optimizing Disk Performance
891(14)
Using Disk Defragmenter
895(2)
Performance Logs and Alerts
897(6)
Two-Minute Drill
903(2)
Part VI Addressing and Name Resolution 905(272)
Installing and Managing Windows 2000 Networking Protocols
907(56)
Windows 2000 TCP/IP
909(16)
Introduction to TCP/IP
910(4)
The TCP/IP Protocol Suite
914(10)
Using the Windows 2000 FTP Client
924(1)
IP Addressing
925(13)
Locating IP Addressing Information
925(1)
How IP Addressing Works
925(1)
Finding Your Computer's IP Addressing Information
926(3)
Binary Addressing
929(2)
Address Classes
931(3)
Subnetting and Supernetting
934(3)
Classless Addressing: CIDR
937(1)
Installing, Configuring, Managing, and Monitoring TCP/IP
938(18)
Installing TCP/IP in Windows 2000
938(1)
Installing TCP/IP in Windows 2000
939(2)
Configuring TCP/IP in Windows 2000
941(1)
Configuring TCP/IP
941(7)
TCP/IP Best Practices
948(1)
Troubleshooting TCP/IP
948(5)
Managing and Monitoring Network Traffic
953(3)
Installing and Configuring NWLink
956(7)
Installing the NWLink Protocol
956(1)
Configuring NWLink
957(1)
Installing and Configuring NWLink in Windows 2000
957(2)
Protocol Binding Order
959(2)
Two-Minute Drill
961(2)
Installing and Managing the DHCP Server
963(56)
Overview of DHCP
964(8)
DHCP Leases
965(1)
The DHCP Lease Process
965(2)
Lease Renewal
967(2)
The DHCP Lease Process
969(1)
Installing the DHCP Server Service
970(2)
DHCP Server Configuration
972(22)
DHCP Scopes
972(1)
DHCP Options
973(12)
BOOTP Tables
985(1)
Superscopes
986(3)
Creating a New Scope
989(3)
Configuring Options
992(2)
DHCP Relay Agents in a Routed Environment
994(6)
Using BOOTP Forwarding or DHCP Relay Agents
994(1)
Configuring the DHCP Relay Agent
995(4)
Configuring a DHCP Relay Agent
999(1)
Integrating DHCP with DDNS
1000(4)
Integrating Downlevel DHCP Clients and Dynamic DNS
1002(1)
Enabling a DHCP Server to Update Downlevel DHCP Client Information
1003(1)
Integrating DHCP with RRAS
1004(2)
Configuring RRAS to Use DHCP to Assign IP Addresses
1005(1)
Integrating DHCP with Active Directory
1006(3)
Authorizing DHCP Servers
1006(2)
Authorizing a DHCP Server in the Active Directory
1008(1)
DHCP and APIPA
1009(2)
Disabling Automatic Private IP Addressing
1010(1)
Monitoring and Troubleshooting DHCP
1011(8)
Using Event Viewer
1011(1)
Using System Monitor
1012(1)
Using Logs
1013(1)
Enabling DHCP Server Logging
1013(3)
Two-Minute Drill
1016(3)
Installing and Managing the Windows 2000 WINS Server
1019(56)
Introduction to NetBIOS Name Resolution
1020(30)
NetBIOS over TCP/IP
1021(4)
Resolving NetBIOS Names to IP Addresses
1025(3)
Creating an LMHOSTS File
1028(5)
WINS Network Components
1033(3)
How WINS Works
1036(3)
Installing the WINS Server Service
1039(1)
Configuring Intervals on the WINS Server
1040(1)
New and Improved Windows 2000 WINS Server Features
1041(5)
WINS Replication
1046(3)
Disabling NetBT
1049(1)
Planning and Implementing a WINS Solution
1050(10)
Installing and Configuring the WINS Server and Client
1051(2)
Creating a Static Mapping
1053(1)
Managing the WINS Database
1054(6)
Interoperability Issues
1060(3)
WINS and DHCP
1060(1)
WINS and DNS
1060(3)
Monitoring and Troubleshooting WINS
1063(12)
Troubleshooting WINS Client-Related Problems
1063(1)
Troubleshooting WINS Server-Related Issues
1064(2)
System Monitor
1066(1)
Configuring WINS Server Startup Behavior
1067(5)
Two-Minute Drill
1072(3)
Installing and Managing the Windows 2000 DNS Server
1075(102)
The Domain Name System: Introductory Concepts and Procedures
1076(36)
The Flat NetBIOS Namespace
1078(1)
The NetBIOS and WinSock Interfaces
1078(3)
The DNS Namespace
1081(2)
Domain and Host Name Specifications
1083(4)
Planning Domain Names for an Organization
1087(4)
Naming Your Subdomains
1091(1)
Zones of Authority
1092(6)
Installing the Windows 2000 DNS Server
1098(2)
Resource Records
1100(3)
Zone Delegation
1103(2)
Zone Transfer
1105(7)
How Host Names Are Resolved
1112(9)
The Order of Host Name Resolution
1112(2)
Recursive Queries
1114(1)
Iterative Queries
1115(1)
Looking Up an Address from a Name
1116(3)
Performing a Forward Lookup
1119(1)
Looking Up a Name from an Address
1120(1)
Windows 2000 DNS Server Roles
1121(12)
Primary DNS Server
1122(2)
Secondary DNS Servers
1124(1)
Caching-Only Servers
1125(2)
DNS Forwarders and Slave Servers
1127(2)
Dynamic DNS Servers (DDNS)
1129(4)
Integrating Windows 2000 DNS Server with Active Directory
1133(9)
Secure Dynamic Updates
1134(4)
Adding a DHCP Server to the DnsUpdateProxy Group
1138(3)
Active Directory Integrated Zone Replication
1141(1)
SRV Records in Windows 2000 DNS
1141(1)
Integrating Windows 2000 DNS Server with DHCP
1142(2)
Managing the Windows 2000 DNS Server
1144(15)
Configuring Server Properties
1144(5)
Configuring Zone Properties
1149(6)
Configuring Windows 2000 DNS Clients
1155(4)
Monitoring and Troubleshooting DNS
1159(18)
IPCONFIG
1159(1)
NSLOOKUP
1160(2)
Using the Nslookup Utility
1162(1)
Using the System Monitor
1163(3)
Using Event Viewer
1166(1)
Using Trace Logs
1166(1)
Network Monitor
1167(2)
The Monitoring Tab
1169(4)
Two Minute Drill
1173(4)
Part VII Internetworking Windows 2000 1177(208)
Planning and Configuring Windows 2000 Remote Access
1179(84)
Introduction
1180(1)
Overview: Windows 2000 Routing and Remote Access Service
1181(6)
What Is Remote Access?
1182(1)
Remote Access vs. Remote Control
1182(1)
Remote Access Connections
1183(1)
Remote Access Clients
1183(1)
Remote Access Administration
1184(3)
Installing and Configuring the Remote Access Service
1187(7)
Hardware Requirements
1187(2)
Enabling the Routing and Remote Access Service
1189(1)
Enabling the Routing and Remote Access Service
1190(4)
Configuring the Remote Access Server
1194(5)
Configuring the Remote Access Server
1195(3)
Testing Connectivity to the Remote Access Server
1198(1)
Managing and Monitoring the Remote Access Server
1198(1)
Assigning Remote Access Permissions
1199(14)
Remote Policies
1199(1)
The Default Remote Access Policy
1200(2)
The Administrative Models for Remote Access Policy
1202(2)
Remote Access Policy Conditions
1204(1)
Remote Access Policy Profiles
1205(3)
Modifying the Default Remote Access Policy
1208(2)
Determining Access Permissions---Putting It All Together
1210(1)
Troubleshooting Remote Access Connections
1211(2)
Virtual Private Networking
1213(13)
VPN Overview
1213(1)
Components of Windows 2000 VPN
1214(6)
Installing and Configuring the VPN Server
1220(1)
Configuring Firewalls with VPNs
1221(2)
Testing Connectivity to the VPN Server
1223(1)
Configuring a VPN Remote Access Client on Windows 2000 Professional
1224(1)
Troubleshooting VPNs
1225(1)
Connections Using PPP Multilink and BAP
1226(4)
PPP Multilink Protocol
1227(1)
BAP
1228(1)
Configuring Multilink Support on Your Remote Access Server
1229(1)
Integrating Remote Access and DHCP
1230(7)
Obtaining DHCP Addresses via RRAS
1230(1)
Obtaining DHCP Options via RRAS
1231(1)
Location of the DHCP Server
1232(1)
Automatic Private IP Addresses---APIPA
1232(1)
Multihomed Servers
1232(1)
Off-Subnet Addressing and On-Subnet Addressing
1233(1)
Demonstrating APIPA
1234(3)
Managing and Monitoring Remote Access
1237(5)
Additional Routing and Remote Access Administration Tools
1237(4)
Setting Up a Log File for Database Analysis
1241(1)
Remote Access Security
1242(13)
Secure Authentication
1242(5)
Data Encryption
1247(1)
Packet Filtering
1248(2)
Secure Callback
1250(1)
Caller ID
1250(1)
Remote Access Account Lockout
1251(1)
Enabling and Configuring Suitable Authentication Protocols for Different Types of Users
1252(2)
Troubleshooting Remote Access Security
1254(1)
Remote Access Best Practices and Tips
1255(8)
Two-Minute Drill
1259(4)
Planning and Configuring IP Routing
1263(78)
Overview of Windows 2000 IP Routing
1264(9)
What Is a Router?
1265(1)
Routed vs. Nonrouted Networks
1266(1)
Routing Fundamentals
1267(3)
Viewing a Routing Table on a Windows TCP/IP Computer
1270(3)
Enabling and Configuring Windows 2000 as an IP Software Router
1273(8)
Do You Need to Install Routing Protocols?
1274(1)
Static Routes
1274(2)
Configuring the Router for IGMP
1276(3)
Configuring the Router for ICMP Router Discovery
1279(2)
Implementing Routing Protocols
1281(10)
Installing Dynamic Routing Protocols
1281(1)
Adding Interfaces to the Routing Protocols
1282(1)
Dynamic Routing Issues
1282(3)
Common Problems with Dynamic Routing
1285(4)
Combining Different Routing Protocols on the Same Router
1289(1)
Common Routing Terminology Used with Large Internetworks
1290(1)
RIP for IP
1291(6)
Changing RIP Interface Properties to Support RIPv2 Exclusively and with Authentication
1296(1)
OSPF
1297(12)
Characteristics of OSPF
1298(1)
OSPF Terminology and Concepts
1299(7)
Configuring Your Router with Area Information
1306(1)
OSPF Configuration Requirements
1307(2)
Demand-Dial Routing
1309(15)
What Is Demand-Dial Routing?
1309(5)
Enabling Demand-Dial Routing
1314(1)
Enabling Demand-Dial Routing
1315(3)
Configuring Demand-Dial Interfaces
1318(3)
Using Remote Access Policies with Demand-Dial Routing
1321(1)
Routing over Demand-Dial Interfaces
1322(2)
Troubleshooting IP Routing Problems
1324(17)
When Is Routing Troubleshooting Required?
1324(2)
Different Troubleshooting Approaches
1326(1)
TCP/IP Tools and Utilities
1327(5)
Verifying Each Component
1332(6)
Two-Minute Drill
1338(3)
Installing, Configuring, and Troubleshooting Windows 2000 NAT
1341(44)
Overview of ICS and NAT
1342(18)
Why Share an Internet Connection?
1343(1)
What's the Difference between ICS and NAT?
1344(2)
What's the Difference between an Address Translation Service and a Proxy Server Service?
1346(3)
Using VPNs in a SOHO Environment
1349(1)
How Address Translation Works
1349(5)
Dynamic vs. Static Mapping
1354(3)
Private vs. Public IP Addresses
1357(2)
Walkthrough of Address Translation in Action
1359(1)
Internet Connection Sharing
1360(6)
Creating and Sharing a Dial-Up Connection
1360(2)
Enabling Internet Connection Sharing for Dynamic Mapping
1362(1)
Enabling Internet Connection Sharing for a Static Mapping
1363(1)
Configuring Connection Sharing on the Clients
1364(1)
Limitations of ICS
1365(1)
Network Address Translation
1366(7)
Enabling RRAS with NAT on the Server
1366(1)
Ensuring RRAS is Configured for Routing
1367(1)
Installing the NAT Protocol
1367(1)
Installing the NAT Protocol
1368(2)
Configuring Global NAT Properties
1370(1)
Configuring NAT Interface Properties
1371(1)
Monitoring NAT
1372(1)
Troubleshooting ICS and NAT
1373(12)
Common Troubleshooting Issues
1374(4)
Detecting a Conflicting DHCP Server
1378(3)
Two-Minute Drill
1381(4)
Part VIII Windows 2000 Networking Security 1385(98)
Configuring and Troubleshooting IPSec
1387(58)
Overview of IP Security
1388(26)
IPSec Terminology
1390(1)
Basics of Encryption
1391(5)
IPSec Standards
1396(2)
IPSec Architecture
1398(1)
IPSec Protocols
1399(2)
Security Negotiation
1401(3)
How IPSec Works
1404(4)
IPSec and SNMP
1408(1)
IPSec and L2TP
1408(3)
Setting the Encryption Level on a VPN Client
1411(3)
Enabling and Configuring IPSec
1414(20)
IPSec Policies
1414(1)
Factors to Consider
1414(3)
Creating a Custom IPSec MMC
1417(4)
IPSec Policy Properties
1421(3)
Configuring IPSec Policy Components
1424(4)
Configuring IPSec Authentication Methods
1428(2)
Configuring Connection Types
1430(2)
Configuring IPSec Tunneling
1432(1)
Configuring Advanced Settings
1432(2)
Managing, Monitoring, and Troubleshooting IPSec
1434(11)
Managing IPSec
1434(3)
Using IPSec Monitor
1437(1)
Accessing the IPSec Monitor
1437(1)
IPSec Policy Agent Entries in the System and Security Logs
1438(1)
Common Troubleshooting Scenarios
1439(4)
Two-Minute Drill
1443(2)
Installing and Configuring Certificate Services
1445(38)
Overview of Certificate Services
1446(10)
Installing Certificate Services
1449(2)
What Is a Public Key Certificate?
1451(1)
Uses of Certificates
1451(1)
Information Contained in Certificates
1452(1)
The Certification Hierarchy
1453(2)
The Certificate Store
1455(1)
Management and Administration of Certificates
1456(5)
Using the Certificates MMC
1456(1)
Using the MMC Certification/Certification Authority Snap-In
1457(1)
Publishing Certificates to Active Directory
1458(1)
Certificate Formats
1459(1)
Importing and Exporting Certificates
1460(1)
Creating and Issuing Certificates in Windows 2000
1461(6)
Generating Encryption Keys and Certificate Requests
1461(1)
Processing Certificate Requests
1462(2)
Requesting a Certificate via the Web-Based Request Form
1464(2)
Revoking Certificates
1466(1)
Certificate-Based Authentication
1467(8)
Revoking a Certificate
1467(1)
External Users
1468(1)
Mapping a Certificate to a User Account
1468(2)
Mapping a Certificate to a User Account
1470(5)
Encrypting File System (EFS) Recovery Keys
1475(3)
Removing the EFS Recovery Key
1476(2)
Troubleshooting Certificates
1478(5)
Troubleshooting a Certificate
1479(2)
Two-Minute Drill
1481(2)
A About the CD 1483(6)
Installing Cert Trainer
1484(1)
System Requirements
1484(1)
Cert Trainer
1484(1)
ExamSim
1484(2)
Saving Scores as Cookies
1485(1)
E-Book
1486(1)
CertCam
1486(1)
Lab Questions & Answers
1487(1)
Self Test
1488(1)
Help
1488(1)
Upgrading
1488(1)
Index 1489

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program